<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for hawk2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:20091-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-13T12:46:40Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-13T12:46:40Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-13T12:46:40Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for hawk2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for hawk2 fixes the following issues:

- Bump ruby gem rack to 3.1.18 (bsc#1251939).
- Bump ruby gem uri to 1.0.4.
- Fix the mtime in manifest.json (bsc#1230275).
- Make builds determinitstic (bsc#1230275).
- Bump rails version from 8.0.2 to 8.0.2.1 (bsc#1248100).
- Require openssl explicitly (bsc#1247899).</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLES-HA-16.0-134</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620091-1/</URL>
      <Description>Link for SUSE-SU-2026:20091-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2026-January/023809.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:20091-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1230275</URL>
      <Description>SUSE Bug 1230275</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247899</URL>
      <Description>SUSE Bug 1247899</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248100</URL>
      <Description>SUSE Bug 1248100</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1251939</URL>
      <Description>SUSE Bug 1251939</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-55193/</URL>
      <Description>SUSE CVE CVE-2025-55193 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61919/</URL>
      <Description>SUSE CVE CVE-2025-61919 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Availability Extension 16.0">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Availability Extension 16.0">
        <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 16.0" CPE="cpe:/o:suse:sle-ha:16.0">SUSE Linux Enterprise High Availability Extension 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1">
      <FullProductName ProductID="hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1">hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 16.0:hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1">hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1 as a component of SUSE Linux Enterprise High Availability Extension 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Active Record connects classes to relational database tables. Prior to versions 7.1.5.2, 7.2.2.2, and 8.0.2.1, the ID passed to find or similar methods may be logged without escaping. If this is directly to the terminal it may include unescaped ANSI sequences. This issue has been patched in versions 7.1.5.2, 7.2.2.2, and 8.0.2.1.</Note>
    </Notes>
    <CVE>CVE-2025-55193</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 16.0:hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620091-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-55193.html</URL>
        <Description>CVE-2025-55193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248099</URL>
        <Description>SUSE Bug 1248099</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, `Rack::Request#POST` reads the entire request body into memory for `Content-Type: application/x-www-form-urlencoded`, calling `rack.input.read(nil)` without enforcing a length or cap. Large request bodies can therefore be buffered completely into process memory before parsing, leading to denial of service (DoS) through memory exhaustion. Users should upgrade to Rack version 2.2.20, 3.1.18, or 3.2.3, anu of which enforces form parameter limits using `query_parser.bytesize_limit`, preventing unbounded reads of `application/x-www-form-urlencoded` bodies. Additionally, enforce strict maximum body size at the proxy or web server layer (e.g., Nginx `client_max_body_size`, Apache `LimitRequestBody`).</Note>
    </Notes>
    <CVE>CVE-2025-61919</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 16.0:hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-202620091-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61919.html</URL>
        <Description>CVE-2025-61919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251934</URL>
        <Description>SUSE Bug 1251934</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
